getapp-logo

App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. 

Encryption Software with Third-Party Integrations (2026) - Page 2

Last updated: February 2026

1 filter applied

Features


Integrated with


Pricing model


Devices supported


Organization types


User rating


60 software options

Passbolt logo

Secure password collaboration for tech teams

learn more
Passbolt: Mission critical password management that scales with your organization.
Passbolt is an open source password collaboration manager designed for tech teams first. It allows them to share passwords instantly, securely and granularly while keeping full audit capabilities.

Read more about Passbolt

Users also considered
AxCrypt logo

AxCrypt, File encryption software, Password manager

learn more
AxCrypt is a file encryption software that provides secure data storage and sharing. AxCrypt is designed to be user-friendly while maintaining a high level of encryption for sensitive information.

Read more about AxCrypt

Users also considered
NordLayer logo
Category Leaders

A toggle-ready way to secure your network.

learn more
To protect user activity operating within site-to-site and company gateways and safely transition data between endpoints, NordLayer utilizes AES 256-bit encryption to hide traffic from threats of open and unsecured networks outside the company grid.

Read more about NordLayer

Users also considered
EventSentry logo

Real-time log & event log hybrid SIEM monitoring solution

learn more
EventSentry is a hybrid SIEM (security information & event management) solution which offers a range of tools including event log monitoring, reporting, health monitoring, compliance management, network monitoring, environment tracking, data consolidation, Active Directory integration & more

Read more about EventSentry

Users also considered
Invicti logo

Zero-Noise AppSec & Vulnerability Management Platform

learn more
DAST-first platform for scalable, accurate application security. Combines DAST, IAST, API security, SAST, static and dynamic SCA, and container security to find and prove real risks—eliminating noise, automating remediation, and empowering teams to secure everything from a single platform.

Read more about Invicti

Users also considered
Trustifi logo

Protect Your Business Emails with AI-Powered Security

learn more
Email security solution that helps manage threat detection, regulatory compliance, data encryption, whitelisting/blacklisting, and more.

Read more about Trustifi

Users also considered
Files.com logo

Automation-Focused Cloud Platform for Secure File Transfer

learn more
Unlike "MFT" Competitors, Files.com runs entirely in the cloud, offering 7 storage regions & direct connectivity to Amazon S3, Azure, Google Cloud Platform, Box, Dropbox, Wasabi & On-Premise Storage.

Read more about Files.com

Users also considered
Probely logo

Automate Security Testing from Threat Found to Ticket Closed

learn more
Probely helps security experts & software developers find vulnerabilities, fix them and automate security testing with ease.

Read more about Probely

Users also considered
RG System Suite logo

100% French SaaS suite for MSPs

learn more
The RG System Suite platform is ideal for IT service providers who want to centralise, automate and secure infrastructure management

Read more about RG System Suite

Users also considered
Qualys Cloud Platform logo

Computer and network security software for IT professionals

learn more
Qualys Cloud Platform is designed to help businesses automate the security and monitoring of web applications and gain visibility into the utilization of IT assets. It enables IT professionals to detect threats related to unauthorized access across networks and conduct audits and IP scans.

Read more about Qualys Cloud Platform

Users also considered
Vault logo

Secure data storage and access management software

learn more
Vault by HashiCorp is a data protection software designed to help businesses secure, store, and manage access to passwords, tokens, encryption keys, and certificates to protect confidential data across databases, workloads, systems, infrastructures, networks, and more.

Read more about Vault

Users also considered
Proton Pass logo

Password management solution

learn more
Proton Pass uses end-to-end encryption to secure all your data—passwords, notes, and 2FA codes—so only you can access it. Data is encrypted on your device before syncing to Proton’s servers, ensuring even Proton can’t read your information.

Read more about Proton Pass

Users also considered
Ubiq logo

Data encryption integration platform for developers

learn more
The Ubiq platform allows you to integrate data encryption directly into any application in minutes, with a few lines of code. It is interoperable across diverse applications and languages, storage types, and cloud environments.

Read more about Ubiq

Users also considered
DriveLock logo

Cloud-based tool for protecting company data & end-devices

learn more
DriveLock is a cloud-based software that helps with encryption of all information and protection against unauthorized access.

Read more about DriveLock

Users also considered
EncryptTitan logo

Cloud-based email encryption software

learn more
EncryptTitan is an email encryption software designed to help businesses protect against data breaches and exchange information securely via email in compliance with various federal and state privacy regulations. Its Microsoft Outlook plugin allows users to select specific emails for encryption.

Read more about EncryptTitan

Users also considered
ITAC SecureFile logo

Transfer and automate files with total security

learn more
Software for secure file transfer and data management which allows companies to share and transfer files securely and meet regulatory compliance requirements.

Read more about ITAC SecureFile

Users also considered
SOAX logo

Intelligent Data Collection Platform

learn more
SOAX is an intelligent data collection platform that leading companies use to collect public web data. It provides a wide range of features, including proxy servers, web crawlers, and scraper APIs. These features allow businesses to collect data from a variety of sources.

Read more about SOAX

Users also considered
Uniqkey logo

More than Just a Business Password Manager

learn more
Uniqkey is Europe’s leading password and access manager. It simplifies employee security while empowering companies with enhanced control over their cloud infrastructure, access security, and employee management.

Read more about Uniqkey

Users also considered
OneVault logo

The Most Secure Solution for Archiving, Governance & DLP

learn more
Donoma OneVault delivers multi-data archiving of email and communication records for centralized, streamlined archiving.

Read more about OneVault

Users also considered
VaultCore logo

Encryption key management and cybersecurity software

learn more
VaultCore is an encryption key management software designed to help corporate businesses, government administrations, and military organizations secure data by deploying key encryption across cloud, virtual, and on-premise environments

Read more about VaultCore

Users also considered
PII Tools logo

Discover, analyze, and remediate sensitive data anywhere

learn more
PII Tools is an AI-powered tool that discovers, analyzes, and remediates sensitive data across structured and unstructured data sources. PII Tools scans through files, emails, databases, and cloud storage to detect personal and sensitive information. The software generates detailed reports to help organizations identify compliance and data privacy risks. PII Tools enables surgical redaction and cleansing of sensitive data to help mitigate breach impact.

Read more about PII Tools

Users also considered
Bitwarden Secrets Manager logo

Software for managing secrets across development lifecycle

learn more
Bitwarden Secrets Manager is designed to simplify and enhance secrets management for development, DevOps, and IT teams. With end-to-end encryption, the platform allows businesses to centrally manage secrets associated with multiple infrastructures and applications.

Read more about Bitwarden Secrets Manager

Users also considered
AWS Key Management Service (KMS) logo

Encryption and compliance management software

learn more
AWS Key Management Service (KMS) is an encryption and compliance management software that helps businesses create, manage, and control access to cryptographic keys across multiple AWS services.

Read more about AWS Key Management Service (KMS)

Users also considered
CloudJacket MDR logo

Managed Cybersecurity Platform with 24/7 SOC Monitoring

learn more
In today's digital landscape, organizations face an ever-evolving array of cyber threats. Secnap's CloudJacket MDR offers a comprehensive, AI-augmented security solution that combines advanced technology with 24/7 expert monitoring, delivering robust protection.

Read more about CloudJacket MDR

Users also considered
NoID logo

We protect email, what you write, read and attach

learn more
NoID is a cloud-based secure email encryption platform. NoID SecureEmail delivers emails from A to B encrypted "On send", and decrypted "On receive". It runs parallel to the existing email solution without any requirement to change any part of it.

Read more about NoID

Users also considered